메뉴 건너뛰기




Volumn 4, Issue , 2005, Pages 2372-2382

The design and implementation of network puzzles

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED DENIAL OF SERVICES (DDOS); HARSH-REVERSAL PUZZLES; NETWORK LAYERS; NETWORK PUZZLES;

EID: 25644445353     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2005.1498523     Document Type: Conference Paper
Times cited : (69)

References (56)
  • 1
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • November
    • D. Moore, C. Shannon, and J. Brown, "Code-Red: A Case Study on the Spread and Victims of an Internet Worm," in Internet Measurement Workshop, November 2002.
    • (2002) Internet Measurement Workshop
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 4
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," in Crypto, 1992.
    • (1992) Crypto
    • Dwork, C.1    Naor, M.2
  • 5
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • R. Merkle, "Secure Communications Over Insecure Channels," Communications of the ACM, vol. 21, no. 4, April 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.4
    • Merkle, R.1
  • 7
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion
    • A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," in NDSS, 1999, pp. 151-165.
    • (1999) NDSS , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 10
    • 1642344572 scopus 로고    scopus 로고
    • Towards network denial of service resistant protocols
    • J. Leiwo, T. Aura, and P. Nikander, "Towards Network Denial of Service Resistant Protocols," in SEC, 2000, pp. 301-310.
    • (2000) SEC , pp. 301-310
    • Leiwo, J.1    Aura, T.2    Nikander, P.3
  • 13
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Lecture Notes in Computer Science, vol. 2009, pp. 46+, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 46
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.4
  • 14
  • 16
  • 17
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • August
    • S. Crosby and D. Wallach, "Denial of Service via Algorithmic Complexity Attacks," in USENIX Security Symposium, August 2003.
    • (2003) USENIX Security Symposium
    • Crosby, S.1    Wallach, D.2
  • 18
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • July
    • V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," Computer Communication Review, vol. 31. no. 3, July 2001.
    • (2001) Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1
  • 26
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • January
    • T. Dierks and C. Allen, "The TLS Protocol Version 1.0," RFC 2246, January 1999.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 30
    • 0003232377 scopus 로고
    • Internet control message protocol
    • September
    • J. Postal, "Internet Control Message Protocol," RFC 792, September 1981.
    • (1981) RFC , vol.792
    • Postal, J.1
  • 32
    • 0002624024 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • December
    • H. Burch and W. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," in USENIX LISA, December 2000.
    • (2000) USENIX LISA
    • Burch, H.1    Cheswick, W.2
  • 33
  • 35
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in INFOCOM 2001, 2001, pp. 878-886.
    • (2001) INFOCOM 2001 , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 36
    • 84861252355 scopus 로고    scopus 로고
    • ICMP Traceback Working Group, "ICMP Traceback (itrace)," http://www.ietf.org/html.charters/itrace-charter.html, 2002.
    • (2002) ICMP Traceback (Itrace)
  • 39
    • 3543120323 scopus 로고    scopus 로고
    • Persistent dropping: An efficient control of traffic aggregates
    • August
    • H. Jamjoom and K. Shin, "Persistent Dropping: An Efficient Control of Traffic Aggregates," in SIGCOMM, August 2003.
    • (2003) SIGCOMM
    • Jamjoom, H.1    Shin, K.2
  • 41
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for internet services
    • March
    • D. Andersen, "Mayday: Distributed Filtering for Internet Services," in USITS, March 2003.
    • (2003) USITS
    • Andersen, D.1
  • 44
    • 14844310899 scopus 로고    scopus 로고
    • Hashcash: A denial of service counter-measure
    • Cypherspace, August
    • A. Back, "Hashcash: A Denial of Service Counter-Measure," Tech. Rep., Cypherspace, August 2002, http://cypherspace.org/hashcash/hashcash.pdf.
    • (2002) Tech. Rep.
    • Back, A.1
  • 45
    • 14844282689 scopus 로고    scopus 로고
    • Guaranteeing access in spite of service-flooding attacks
    • April
    • V. Gligor, "Guaranteeing Access in Spite of Service-Flooding Attacks," in Security Protocols Workshop, April 2003.
    • (2003) Security Protocols Workshop
    • Gligor, V.1
  • 46
    • 0003216023 scopus 로고    scopus 로고
    • Internet protocol, version 6 (IPv6) specification
    • December
    • S. Deering and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification," RFC 2460, December 1998.
    • (1998) RFC , vol.2460
    • Deering, S.1    Hinden, R.2
  • 48
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • August
    • S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," ACM/IEEE Transactions on Networking, vol. 1, no. 4, pp. 397-413, August 1993.
    • (1993) ACM/IEEE Transactions on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 49
    • 50049083730 scopus 로고    scopus 로고
    • Intel, "Intel IXP2850 Network Processor," http://www.Intel.com/ design/network/products/npfamily/ixp2850.htm, 2003.
    • (2003) Intel IXP2850 Network Processor
  • 51
    • 0035012756 scopus 로고    scopus 로고
    • Stochastic fair blue: A queue management algorithm for enforcing fairness
    • April
    • W. Feng, D. Kandlur, D. Saha, and K. Shin, "Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness," in Proc. of INFOCOM, April 2001.
    • (2001) Proc. of INFOCOM
    • Feng, W.1    Kandlur, D.2    Saha, D.3    Shin, K.4
  • 53
    • 0029778714 scopus 로고    scopus 로고
    • Hardware-efficient fair queueing architecture for high-speed networks
    • March
    • J.L. Rexford, A.G. Greenberg, and F.G. Bonomi, "Hardware-Efficient Fair Queueing Architecture for High-Speed Networks," in Proceedings of INFOCOM, March 1996.
    • (1996) Proceedings of INFOCOM
    • Rexford, J.L.1    Greenberg, A.G.2    Bonomi, F.G.3
  • 55
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • January
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," in 10th Annual USENIX Security Symposium, January 1998.
    • (1998) 10th Annual USENIX Security Symposium
    • Paxson, V.1
  • 56
    • 84861246951 scopus 로고    scopus 로고
    • Distributed intrusion detection system
    • DShield.org, "Distributed Intrusion Detection System," http://www.dshield.org, 2002.
    • (2002) DShield.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.